Je hebt een klacht over de onderstaande posting:
Over oud lek gesproken - een 0day 16bit probleem dat ook in Win7 zit...: (van ISC.SANS, 19 januari) In a posting to a public mailing list, Tavis Ormandy disclosed a zero day privilege escalation vulnerability in the Windows kernel. All versions of Windows, starting with Windows NT 3.1 up to including Windows 7, are affected. The vulnerability affects support for 16 bit applications. In most cases, it is safe to turn off support for 16 bit applications. Here are the mitigation instructions (copied from the advisory): Temporarily disabling the MSDOS and WOWEXEC subsystems will prevent the attack from functioning, as without a process with VdmAllowed, it is not possible to access NtVdmControl() (without SeTcbPrivilege, of course). The policy template "Windows ComponentsApplication CompatibilityPrevent access to 16-bit applications" may be used within the group policy editor to prevent unprivileged users from executing 16-bit applications. I'm informed this is an officially supported machine ...
Beschrijf je klacht (Optioneel):